Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine.
With the Graylog Integration, Zenduty sends new Gralog conditional alerts to the right team and notifies them based on on-call schedules via email, text messages (SMS), phone calls(Voice), Slack, Microsoft Teams and iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed. Zenduty provides your application engineers with detailed context around the Graylog alert along with playbooks and a complete incident command framework to triage and remediate and resolve incidents with speed.
Whenever a condition on Graylog is met, Zenduty will create an incident.
You can also use Alert Rules to custom route specific Graylog alerts to specific users, teams or escalation policies, write suppression rules, auto add notes, responders and incident tasks.
To add a new Graylog integration, go to “Teams” on Zenduty and click on the “Manage” button corresponding to the team you want to add the integration to.
Next, go to “Services” and click on the “Manage” button corresponding to the relevant Service.
Go to “Integrations” and then “Add New Integration”. Give it a name and select the application “Graylog” from the dropdown menu.
Go to “Configure” under your integrations and copy the webhooks URL generated.
Log in to Graylog. Go to “Notification Channels”-> Add New Channel. Select type as “Webhook”.
Select “Inputs” under the “Systems” drop-down menu. From the “Select Input” drop-down list, select “Syslog UDP” and click on “Launch New Input”.
Select the “Node” and enter the title of the input and save it.
Click on “Alerts” from the menu. Select “Conditons” from the “Manage Alert Conditions” section.
Select “Message Count Condition” from “Condition” type drop-down list and Add alert.
Enter the title of the alert, set the time range and threshold type. Set the threshold value, grace period, message backlogs and save.
Click on “Notifications” under the “Manage Alert Conditions” section.
Click on “Add New Notification”. Select HTTP Alarm Callback under the Notification type drop-down list.
Enter the title of the notification and under URL, paste the copied link.
Graylog is now integrated and Zenduty will create incidents from the alerts.
Looking for a better way to get real-time alerts from Graylog Integration, setup a solid incident escalation and incident response pipeline and minimize response and resolution times for Graylog Integration incidents?